diff --git a/apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/ActivateDeactivatePartnerApiKey.yml b/apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/ActivatePartnerApiKey.yml
similarity index 100%
rename from apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/ActivateDeactivatePartnerApiKey.yml
rename to apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/ActivatePartnerApiKey.yml
diff --git a/apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/DeactivatePartnerApiKey.yml b/apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/DeactivatePartnerApiKey.yml
new file mode 100644
index 0000000000..52221c5ac7
--- /dev/null
+++ b/apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/DeactivatePartnerApiKey.yml
@@ -0,0 +1,19 @@
+ActivateDeactivatePartnerApiKey:
+ Pms_ActivateDeactivatePartnerApiKey_activate_allValid_smoke:
+ endPoint: /v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status
+ role: partnerrevamp
+ description: Deactivating Partner API Key
+ checkErrorsOnlyInResponse: true
+ restMethod: patch
+ inputTemplate: pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey
+ outputTemplate: pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKeyResult
+ input: '{
+ "partnerId": "111999",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "label": "string",
+ "requesttime": "$TIMESTAMP$",
+ "status": "De-Active"
+}'
+ output: '{
+ "response": "Partner apikey de-activated successfully."
+}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/GetAllActivePolicyGroups/GetAllActivePolicyGroups.yml b/apitest/src/main/resources/pms/GetAllActivePolicyGroups/GetAllActivePolicyGroups.yml
index 681a04247c..237e39b415 100644
--- a/apitest/src/main/resources/pms/GetAllActivePolicyGroups/GetAllActivePolicyGroups.yml
+++ b/apitest/src/main/resources/pms/GetAllActivePolicyGroups/GetAllActivePolicyGroups.yml
@@ -1,7 +1,7 @@
GetAllActivePolicyGroups:
Pms_GetAllActivePolicyGroups_All_Valid_Smoke:
endPoint: /v1/policymanager/policies/getAllPolicyGroups
- description: Fetching all the activated PolicyGroups
+ description: Fetching all the active PolicyGroups
role: partnerrevamp
checkErrorsOnlyInResponse: true
restMethod: get
@@ -10,4 +10,38 @@ GetAllActivePolicyGroups:
input: '{
}'
output: ' {
+}'
+ Pms_GetAllActivePolicyGroups_without_auth:
+ endPoint: /v1/policymanager/policies/getAllPolicyGroups
+ description: Fetching all the active PolicyGroups without token
+ role: batch
+ checkErrorsOnlyInResponse: true
+ restMethod: get
+ inputTemplate: pms/GetAllActivePolicyGroups/getAllActivePolicyGroups
+ outputTemplate: pms/error
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-401"
+ }
+ ]
+}'
+ Pms_GetAllActivePolicyGroups_Invalid_auth:
+ endPoint: /v1/policymanager/policies/getAllPolicyGroups
+ description: Fetching all the active PolicyGroups with invalid token
+ role: regproc
+ checkErrorsOnlyInResponse: true
+ restMethod: get
+ inputTemplate: pms/GetAllActivePolicyGroups/getAllActivePolicyGroups
+ outputTemplate: pms/error
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-403"
+ }
+ ]
}'
diff --git a/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner/GetAllApiKeyForAuthPartner.yml b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner/GetAllApiKeyForAuthPartner.yml
index f4e66ea152..81d3717e21 100644
--- a/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner/GetAllApiKeyForAuthPartner.yml
+++ b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner/GetAllApiKeyForAuthPartner.yml
@@ -1,7 +1,7 @@
GetAllApiKeyForAuthPartner:
Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke:
endPoint: /v1/partnermanager/partners/getAllApiKeysForAuthPartners
- description: Fetching all the API Key available for Auth Partners
+ description: Fetching all the API Key available for Auth Partner
role: partnerrevamp
checkErrorsOnlyInResponse: true
restMethod: get
@@ -9,5 +9,39 @@ GetAllApiKeyForAuthPartner:
outputTemplate: pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult
input: '{
}'
- output: ' {
+ output: '{
+}'
+ Pms_GetAllApiKeyForAuthPartner_without_auth:
+ endPoint: /v1/partnermanager/partners/getAllApiKeysForAuthPartners
+ description: Fetching all the API Key available for Auth Partner without token
+ role: batch
+ checkErrorsOnlyInResponse: true
+ restMethod: get
+ inputTemplate: pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner
+ outputTemplate: pms/error
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-401"
+ }
+ ]
+}'
+ Pms_GetAllApiKeyForAuthPartner_invalid_auth:
+ endPoint: /v1/partnermanager/partners/getAllApiKeysForAuthPartners
+ description: Fetching all the API Key available for Auth Partner with invalid token
+ role: regproc
+ checkErrorsOnlyInResponse: true
+ restMethod: get
+ inputTemplate: pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner
+ outputTemplate: pms/error
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-403"
+ }
+ ]
}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/GetAllApiKeyForAuthPartnernegativescenario.yml b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/GetAllApiKeyForAuthPartnernegativescenario.yml
new file mode 100644
index 0000000000..f640885a5c
--- /dev/null
+++ b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/GetAllApiKeyForAuthPartnernegativescenario.yml
@@ -0,0 +1,19 @@
+GetAllApiKeyForAuthPartner:
+ Pms_GetAllApiKeyForAuthPartner:
+ endPoint: /v1/partnermanager/partners/getAllApiKeysForAuthPartners
+ description: Fetching all the API Key available for Auth Partner
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: get
+ inputTemplate: pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner
+ outputTemplate: pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_CERTIFICATE_ERROR_002"
+ }
+ ]
+}'
+
diff --git a/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnerResultnegativescenario.hbs b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnerResultnegativescenario.hbs
new file mode 100644
index 0000000000..7a73a41bfd
--- /dev/null
+++ b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnerResultnegativescenario.hbs
@@ -0,0 +1,2 @@
+{
+}
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnernegativescenario.hbs b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnernegativescenario.hbs
new file mode 100644
index 0000000000..7a73a41bfd
--- /dev/null
+++ b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnernegativescenario.hbs
@@ -0,0 +1,2 @@
+{
+}
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicy.yml b/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicy.yml
index 56b322c9b2..d6744c58a4 100644
--- a/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicy.yml
+++ b/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicy.yml
@@ -9,5 +9,5 @@ GetAllApprovedAuthPartnerPolicy:
outputTemplate: pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicyResult
input: '{
}'
- output: ' {
-}'
\ No newline at end of file
+ output: '{
+}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicyNegativeScenarios.yml b/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicyNegativeScenarios.yml
new file mode 100644
index 0000000000..7fb8d40411
--- /dev/null
+++ b/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicyNegativeScenarios.yml
@@ -0,0 +1,35 @@
+GetAllApprovedAuthPartnerPolicy:
+ Pms_GetAllApprovedAuthPartnerPolicy_without_auth:
+ endPoint: /v1/partnermanager/partners/getAllApprovedAuthPartnerPolicies
+ description: Fetching all Approved Auth Partner Policies without token
+ role: batch
+ checkErrorsOnlyInResponse: true
+ restMethod: get
+ inputTemplate: pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy
+ outputTemplate: pms/error
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-401"
+ }
+ ]
+}'
+ Pms_GetAllApprovedAuthPartnerPolicy_invalid_auth:
+ endPoint: /v1/partnermanager/partners/getAllApprovedAuthPartnerPolicies
+ description: Fetching all Approved Auth Partner Policies with invalid token
+ role: regproc
+ checkErrorsOnlyInResponse: true
+ restMethod: get
+ inputTemplate: pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy
+ outputTemplate: pms/error
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-403"
+ }
+ ]
+}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerId.yml b/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerId.yml
index 053749050a..72fcdd69c6 100644
--- a/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerId.yml
+++ b/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerId.yml
@@ -9,4 +9,9 @@ GetAllApprovedPartnerId:
input: '{
}'
output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_CERTIFICATE_ERROR_002"
+ }
+ ]
}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerIdNegativeScenarios.yml b/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerIdNegativeScenarios.yml
new file mode 100644
index 0000000000..7d9a241d36
--- /dev/null
+++ b/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerIdNegativeScenarios.yml
@@ -0,0 +1,33 @@
+GetAllApprovedPartnerId:
+ Pms_GetAllApprovedPartnerId_without_auth:
+ endPoint: /v1/partnermanager/partners/getAllApprovedPartnerIdsWithPolicyGroups
+ description: Fetching all approved Partner Id without token
+ role: batch
+ restMethod: get
+ inputTemplate: pms/GetAllApprovedPartnerId/getAllApprovedPartnerId
+ outputTemplate: pms/error
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-401"
+ }
+ ]
+}'
+ Pms_GetAllApprovedPartnerId_invalid_auth:
+ endPoint: /v1/partnermanager/partners/getAllApprovedPartnerIdsWithPolicyGroups
+ description: Fetching all approved Partner Id with invalid token
+ role: regproc
+ restMethod: get
+ inputTemplate: pms/GetAllApprovedPartnerId/getAllApprovedPartnerId
+ outputTemplate: pms/error
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-403"
+ }
+ ]
+}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificate.yml b/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificate.yml
index 2520010ebb..3bda9b462d 100644
--- a/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificate.yml
+++ b/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificate.yml
@@ -1,7 +1,7 @@
GetAllCertificate:
Pms_GetAllCertificate_allValid_smoke:
endPoint: /v1/partnermanager/partners/getAllCertificateDetails
- description: Fetching all the API certificates of the Loggedin Partner
+ description: Fetching all the API certificates of the Logged in Partner
role: partnerrevamp
restMethod: get
inputTemplate: pms/GetAllCertificate/getAllCertificate
@@ -27,4 +27,36 @@ GetAllCertificate:
"partnerID": "111996",
"partnerType": "Auth_Partner",
"isCertificateAvailable": true
+}'
+ Pms_GetAllCertificate_without_auth:
+ endPoint: /v1/partnermanager/partners/getAllCertificateDetails
+ description: Fetching all the API certificates of the partner without login
+ role: batch
+ restMethod: get
+ inputTemplate: pms/GetAllCertificate/getAllCertificate
+ outputTemplate: pms/error
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-401"
+ }
+ ]
+}'
+ Pms_GetAllCertificate_invalid_auth:
+ endPoint: /v1/partnermanager/partners/getAllCertificateDetails
+ description: Fetching all the API certificates of the partner invalid partner
+ role: regproc
+ restMethod: get
+ inputTemplate: pms/GetAllCertificate/getAllCertificate
+ outputTemplate: pms/error
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-403"
+ }
+ ]
}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificateNegativeScenarios.yml b/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificateNegativeScenarios.yml
new file mode 100644
index 0000000000..02abf19880
--- /dev/null
+++ b/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificateNegativeScenarios.yml
@@ -0,0 +1,17 @@
+GetAllCertificate:
+ Pms_GetAllCertificate_beforecertifiactes_upload:
+ endPoint: /v1/partnermanager/partners/getAllCertificateDetails
+ description: Fetching all the API certificates of the Logged in Partner
+ role: partnerrevamp
+ restMethod: get
+ inputTemplate: pms/GetAllCertificate/getAllCertificate
+ outputTemplate: pms/error
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_CERTIFICATE_ERROR_002"
+ }
+ ]
+}'
diff --git a/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClient.yml b/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClient.yml
index ba34aef681..efa27fca6a 100644
--- a/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClient.yml
+++ b/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClient.yml
@@ -9,5 +9,10 @@ GetAllOidcClient:
outputTemplate: pms/GetAllOidcClient/getAllOidcClientResult
input: '{
}'
- output: ' {
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_CERTIFICATE_ERROR_002"
+ }
+ ]
}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClientNegativeScenarios.yml b/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClientNegativeScenarios.yml
new file mode 100644
index 0000000000..71902d8c4d
--- /dev/null
+++ b/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClientNegativeScenarios.yml
@@ -0,0 +1,35 @@
+GetAllOidcClient:
+ Pms_GetAllOidcClient_without_Auth:
+ endPoint: /v1/partnermanager/getAllOidcClients
+ description: Fetching all OIDC Clients of the loggedin Partner
+ role: batch
+ checkErrorsOnlyInResponse: true
+ restMethod: get
+ inputTemplate: pms/GetAllOidcClient/getAllOidcClient
+ outputTemplate: pms/GetAllOidcClient/getAllOidcClientResult
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-401"
+ }
+ ]
+}'
+ Pms_GetAllOidcClient_Invalid_Auth:
+ endPoint: /v1/partnermanager/getAllOidcClients
+ description: Fetching all OIDC Clients of the loggedin Partner
+ role: regproc
+ checkErrorsOnlyInResponse: true
+ restMethod: get
+ inputTemplate: pms/GetAllOidcClient/getAllOidcClient
+ outputTemplate: pms/GetAllOidcClient/getAllOidcClientResult
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-403"
+ }
+ ]
+}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/GetAllRequestedPolicy/GetAllRequestedPolicyNegativeScenarios.yml b/apitest/src/main/resources/pms/GetAllRequestedPolicy/GetAllRequestedPolicyNegativeScenarios.yml
new file mode 100644
index 0000000000..e0e89cc6bf
--- /dev/null
+++ b/apitest/src/main/resources/pms/GetAllRequestedPolicy/GetAllRequestedPolicyNegativeScenarios.yml
@@ -0,0 +1,35 @@
+GetAllRequestedPolicies:
+ Pms_GetAllRequestedPolicies_without_auth:
+ endPoint: /v1/partnermanager/partners/getAllRequestedPolicies
+ description: Fetching all the Requested Policies without login token
+ role: batch
+ checkErrorsOnlyInResponse: true
+ restMethod: get
+ inputTemplate: pms/GetAllRequestedPolicy/getAllRequestedPolicy
+ outputTemplate: pms/GetAllRequestedPolicy/getAllRequestedPolicyResult
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-401"
+ }
+ ]
+}'
+ Pms_GetAllRequestedPolicies_invalid_auth:
+ endPoint: /v1/partnermanager/partners/getAllRequestedPolicies
+ description: Fetching all the Requested Policies with invalid role
+ role: regproc
+ checkErrorsOnlyInResponse: true
+ restMethod: get
+ inputTemplate: pms/GetAllRequestedPolicy/getAllRequestedPolicy
+ outputTemplate: pms/GetAllRequestedPolicy/getAllRequestedPolicyResult
+ input: '{
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-403"
+ }
+ ]
+}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/OIDCClient/OIDCClient.yml b/apitest/src/main/resources/pms/OIDCClient/OIDCClient.yml
index 18ac50500b..f0354408b9 100644
--- a/apitest/src/main/resources/pms/OIDCClient/OIDCClient.yml
+++ b/apitest/src/main/resources/pms/OIDCClient/OIDCClient.yml
@@ -21,4 +21,238 @@ CreateOIDCClient:
output: '{
"clientId": "$IGNORE$",
"status": "ACTIVE"
+}'
+ Pms_CreateOIDCClient_invalid_policyID:
+ endPoint: /v1/partnermanager/oauth/client
+ description: Creating OAUTH Client with invalid policyid
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/OIDCClient/oIDCClient
+ outputTemplate: pms/error
+ input: '{
+ "requestTime": "$TIMESTAMP$",
+ "name": "OIDC TEST CLIENT 89767",
+ "policyId": "fgdggh",
+ "publicKey": "$JWKKEY$",
+ "authPartnerId": "111999",
+ "logoUri": "https://health-services.com/logo.png",
+ "redirectUris": "$IDPREDIRECTURI$",
+ "grantTypes": "authorization_code",
+ "clientAuthMethods": "private_key_jwt"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_PRT_073"
+ }
+ ]
+}'
+ Pms_CreateOIDCClient_invalid_logoUri:
+ endPoint: /v1/partnermanager/oauth/client
+ description: Creating OAUTH Client with invalid logoUri
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/OIDCClient/oIDCClient
+ outputTemplate: pms/error
+ input: '{
+ "requestTime": "$TIMESTAMP$",
+ "name": "OIDC TEST CLIENT 89766",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "publicKey": "$JWKKEY$",
+ "authPartnerId": "111999",
+ "logoUri": "https://",
+ "redirectUris": "$IDPREDIRECTURI$",
+ "grantTypes": "authorization_code",
+ "clientAuthMethods": "private_key_jwt"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_COR_001"
+ }
+ ]
+}'
+ Pms_CreateOIDCClient_invalid_RedirectUri:
+ endPoint: /v1/partnermanager/oauth/client
+ description: Creating OAUTH Client with invalid redirectUri
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/OIDCClient/oIDCClient
+ outputTemplate: pms/error
+ input: '{
+ "requestTime": "$TIMESTAMP$",
+ "name": "OIDC TEST CLIENT 89766",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "publicKey": "$JWKKEY$",
+ "authPartnerId": "111999",
+ "logoUri": "https://health-services.com/logo.png",
+ "redirectUris": "$abcdefg",
+ "grantTypes": "authorization_code",
+ "clientAuthMethods": "private_key_jwt"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "invalid_redirect_uri"
+ }
+ ]
+}'
+ Pms_CreateOIDCClient_invalid_auth:
+ endPoint: /v1/partnermanager/oauth/client
+ description: Creating OAUTH Client without token
+ role: regproc
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/OIDCClient/oIDCClient
+ outputTemplate: pms/error
+ input: '{
+ "requestTime": "$TIMESTAMP$",
+ "name": "OIDC TEST CLIENT 89766",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "publicKey": "$JWKKEY$",
+ "authPartnerId": "111999",
+ "logoUri": "https://health-services.com/logo.png",
+ "redirectUris": "$IDPREDIRECTURI$",
+ "grantTypes": "authorization_code",
+ "clientAuthMethods": "private_key_jwt"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-403"
+ }
+ ]
+}'
+ Pms_CreateOIDCClient_without_publickey:
+ endPoint: /v1/partnermanager/oauth/client
+ description: Creating OAUTH Client without publickkey
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/OIDCClient/oIDCClient
+ outputTemplate: pms/error
+ input: '{
+ "requestTime": "$TIMESTAMP$",
+ "name": "OIDC TEST CLIENT 89766",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "publicKey": "$REMOVE$",
+ "authPartnerId": "111999",
+ "logoUri": "https://health-services.com/logo.png",
+ "redirectUris": "$IDPREDIRECTURI$",
+ "grantTypes": "authorization_code",
+ "clientAuthMethods": "private_key_jwt"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_COR_00"
+ }
+ ]
+}'
+ Pms_CreateOIDCClient_invalid_granttypes:
+ endPoint: /v1/partnermanager/oauth/client
+ description: Creating OAUTH Client with invalid granttypes
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/OIDCClient/oIDCClient
+ outputTemplate: pms/error
+ input: '{
+ "requestTime": "$TIMESTAMP$",
+ "name": "OIDC TEST CLIENT 89766",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "publicKey": "$JWKKEY$",
+ "authPartnerId": "111999",
+ "logoUri": "https://health-services.com/logo.png",
+ "redirectUris": "$IDPREDIRECTURI$",
+ "grantTypes": "hghghgg",
+ "clientAuthMethods": "private_key_jwt"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "invalid_grant_type"
+ }
+ ]
+}'
+ Pms_CreateOIDCClient_without_granttypes:
+ endPoint: /v1/partnermanager/oauth/client
+ description: Creating OAUTH Client without granttypes
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/OIDCClient/oIDCClient
+ outputTemplate: pms/error
+ input: '{
+ "requestTime": "$TIMESTAMP$",
+ "name": "OIDC TEST CLIENT 89766",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "publicKey": "$JWKKEY$",
+ "authPartnerId": "111999",
+ "logoUri": "https://health-services.com/logo.png",
+ "redirectUris": "$IDPREDIRECTURI$",
+ "grantTypes": "$REMOVE$",
+ "clientAuthMethods": "private_key_jwt"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_COR_001"
+ }
+ ]
+}'
+ Pms_CreateOIDCClient_without_name:
+ endPoint: /v1/partnermanager/oauth/client
+ description: Creating OAUTH Client without name field
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/OIDCClient/oIDCClient
+ outputTemplate: pms/error
+ input: '{
+ "requestTime": "$TIMESTAMP$",
+ "name": "$REMOVE$",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "publicKey": "$JWKKEY$",
+ "authPartnerId": "111999",
+ "logoUri": "https://health-services.com/logo.png",
+ "redirectUris": "$IDPREDIRECTURI$",
+ "grantTypes": "authorization_code",
+ "clientAuthMethods": "private_key_jwt"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_COR_001"
+ }
+ ]
+}'
+ Pms_CreateOIDCClient_invalid_publickey:
+ endPoint: /v1/partnermanager/oauth/client
+ description: Creating OAUTH Client with invalid publickkey
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/OIDCClient/oIDCClient
+ outputTemplate: pms/error
+ input: '{
+ "requestTime": "$TIMESTAMP$",
+ "name": "OIDC TEST CLIENT 89766",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "publicKey": "dhghfgfyt",
+ "authPartnerId": "111999",
+ "logoUri": "https://health-services.com/logo.png",
+ "redirectUris": "$IDPREDIRECTURI$",
+ "grantTypes": "authorization_code",
+ "clientAuthMethods": "private_key_jwt"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_COR_001"
+ }
+ ]
}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/OIDCClient/UpdateOIDCClient.yml b/apitest/src/main/resources/pms/OIDCClient/UpdateOIDCClient.yml
index ba4342fe70..17a207c1fa 100644
--- a/apitest/src/main/resources/pms/OIDCClient/UpdateOIDCClient.yml
+++ b/apitest/src/main/resources/pms/OIDCClient/UpdateOIDCClient.yml
@@ -3,7 +3,7 @@ UpdateOIDCClient:
endPoint: /v1/partnermanager/oauth/client/{client_id}
role: partnerrevamp
checkErrorsOnlyInResponse: true
- restMethod: post
+ restMethod: put
inputTemplate: pms/OIDCClient/oIDCClientUpdate
outputTemplate: pms/OIDCClient/oIDCClientResult
input: '{
diff --git a/apitest/src/main/resources/pms/PublishPolicy/PublishPolicy.yml b/apitest/src/main/resources/pms/PublishPolicy/PublishPolicy.yml
index 9bdb042175..47cc3b7fc5 100644
--- a/apitest/src/main/resources/pms/PublishPolicy/PublishPolicy.yml
+++ b/apitest/src/main/resources/pms/PublishPolicy/PublishPolicy.yml
@@ -26,4 +26,92 @@ createPublishPolicy:
"mandatory": "$IGNORE$",
"attributeName": "$IGNORE$",
"authTokenType": "$IGNORE$"
- }'
\ No newline at end of file
+ }'
+
+
+ Pms_PublishPolicy_InValid_AlreadyPublished:
+ endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}/publish
+ description: Publish The Policy which is already published
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/PublishPolicy/publishPolicy
+ outputTemplate: pms/error
+ input: '{
+ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_POL_020"
+ }
+ ]
+ }'
+
+ Pms_PublishPolicy_InValid_policygroupId:
+ endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}/publish
+ description: Publish The Policy with invalid policygroupid
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/PublishPolicy/publishPolicy
+ outputTemplate: pms/error
+ input: '{
+ "policygroupId": "sgdasfgbv",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_POL_016"
+ }
+ ]
+ }'
+
+ Pms_PublishPolicy_InValid_policyId:
+ endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}/publish
+ description: Publish The Policy with invalid policyid
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/PublishPolicy/publishPolicy
+ outputTemplate: pms/error
+ input: '{
+ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$",
+ "policyId": "afgrwfg",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_POL_008"
+ }
+ ]
+ }'
+
+ Pms_PublishPolicy_invalid_auth:
+ endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}/publish
+ description: Publish The Policy without access token
+ role: regproc
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/PublishPolicy/publishPolicy
+ outputTemplate: pms/error
+ input: '{
+ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$",
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-403"
+ }
+ ]
+ }'
+
+
+
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/UpdatePolicyStatus/UpdatePolicyStatus.yml b/apitest/src/main/resources/pms/UpdatePolicyStatus/UpdatePolicyStatus.yml
index 33df0d54a5..965a9fba73 100644
--- a/apitest/src/main/resources/pms/UpdatePolicyStatus/UpdatePolicyStatus.yml
+++ b/apitest/src/main/resources/pms/UpdatePolicyStatus/UpdatePolicyStatus.yml
@@ -1,5 +1,5 @@
UpdatePolicyStatus:
- Pms_UpdatePolicyStatus_DeActive_auth_All_Valid_Smoke:
+ Pms_UpdatePolicyStatus_Active_auth_All_Valid_Smoke:
endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}
description: Update Policy Status
role: partnerrevamp
@@ -14,4 +14,122 @@ UpdatePolicyStatus:
}'
output: ' {
"message": "status updated successfully"
- }'
\ No newline at end of file
+ }'
+
+ Pms_UpdatePolicyStatus_DeActive_auth_All_Valid_Smoke:
+ endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}
+ role: partnerrevamp
+ restMethod: patch
+ inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus
+ outputTemplate: pms/UpdatePolicyStatus/updatePolicyStatusResult
+ input: '{
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$",
+ "status":"De-Active",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: ' {
+ "message": "status updated successfully"
+ }'
+
+ Pms_UpdatePolicyStatus_Active_InValid:
+ endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}
+ role: partnerrevamp
+ restMethod: patch
+ inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus
+ outputTemplate: pms/error
+ input: '{
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$",
+ "status":"De-Active",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: ' {
+ "errors": [
+ {
+ "errorCode": "PMS_POL_054",
+ "message": "Cannot activate unpublished policy."
+ }
+ ]
+ }'
+
+ Pms_UpdatePolicyStatus_PolicyId_InValid:
+ endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}
+ role: partnerrevamp
+ restMethod: patch
+ inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus
+ outputTemplate: pms/error
+ input: '{
+ "policyId": "asfgv",
+ "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$",
+ "status":"De-Active",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: ' {
+ "errors": [
+ {
+ "errorCode": "PMS_POL_008",
+ "message": "Policy ID does not exist"
+ }
+ ]
+ }'
+
+ Pms_UpdatePolicyStatus_status_InValid:
+ endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}
+ role: partnerrevamp
+ restMethod: patch
+ inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus
+ outputTemplate: pms/error
+ input: '{
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$",
+ "status":"asfg",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: ' {
+ "errors": [
+ {
+ "errorCode": "PMS_POL_045"
+ }
+ ]
+ }'
+
+ Pms_UpdatePolicyStatus_PolicyGroupId_InValid:
+ endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}
+ role: partnerrevamp
+ restMethod: patch
+ inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus
+ outputTemplate: pms/error
+ input: '{
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "policygroupId":"asfbvef",
+ "status":"Active",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: ' {
+ "errors": [
+ {
+ "errorCode": "PMS_POL_016"
+ }
+ ]
+ }'
+
+ Pms_UpdatePolicyStatus_Missing_status_InValid:
+ endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}
+ role: partnerrevamp
+ restMethod: patch
+ inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus
+ outputTemplate: pms/error
+ input: '{
+ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$",
+ "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$",
+ "status":"$REMOVE$",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: ' {
+ "errors": [
+ {
+ "errorCode": "PMS_COR_003"
+ }
+ ]
+ }'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/UploadCACertificate/UploadCACertificate.yml b/apitest/src/main/resources/pms/UploadCACertificate/UploadCACertificate.yml
index 3b2fa087b8..26289bc656 100644
--- a/apitest/src/main/resources/pms/UploadCACertificate/UploadCACertificate.yml
+++ b/apitest/src/main/resources/pms/UploadCACertificate/UploadCACertificate.yml
@@ -52,4 +52,58 @@ UploadCACertificate:
"requesttime": "$TIMESTAMP$"
}'
output: ' {
+}'
+ Pms_UploadCACertificate_UploadAgain_All_Valid_Smoke:
+ endPoint: /v1/partnermanager/partners/certificate/ca/upload
+ description: Upload CA Cert which is already uploaded
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/UploadCACertificate/uploadCertificate2
+ outputTemplate: pms/error
+ input: '{
+ "requesttime": "$TIMESTAMP$"
+ }'
+ output: ' {
+ "errors": [
+ {
+ "errorCode": "KER-PCM-003"
+ }
+ ]
+}'
+ Pms_UploadCACertificate_with_invalid_data:
+ endPoint: /v1/partnermanager/partners/certificate/ca/upload
+ description: Upload CA Cert with invalid data
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/UploadCACertificate/uploadCertificate3
+ outputTemplate: pms/error
+ input: '{
+ "requesttime": "$TIMESTAMP$"
+ }'
+ output: ' {
+ "errors": [
+ {
+ "errorCode": "KER-CRY-003"
+ }
+ ]
+}'
+ Pms_UploadCACertificate_with_blank_data:
+ endPoint: /v1/partnermanager/partners/certificate/ca/upload
+ description: Upload CA Cert with blank data
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/UploadCACertificate/uploadCertificate4
+ outputTemplate: pms/error
+ input: '{
+ "requesttime": "$TIMESTAMP$"
+ }'
+ output: ' {
+ "errors": [
+ {
+ "errorCode": "PMS_COR_001"
+ }
+ ]
}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/UploadPartnerCert/UploadPartnerCert.yml b/apitest/src/main/resources/pms/UploadPartnerCert/UploadPartnerCert.yml
index 5ad69bc2dd..eaf605ea01 100644
--- a/apitest/src/main/resources/pms/UploadPartnerCert/UploadPartnerCert.yml
+++ b/apitest/src/main/resources/pms/UploadPartnerCert/UploadPartnerCert.yml
@@ -25,4 +25,68 @@ uploadPartnerCert:
"requesttime": "$TIMESTAMP$"
}'
output: ' {
-}'
\ No newline at end of file
+}'
+
+ Pms_UploadPartnerCert_missing_PartnerDomain:
+ endPoint: /v1/partnermanager/partners/certificate/upload
+ description: Upload Partner Cert without partnerdomain
+ role: partnerrevamp
+ restMethod: post
+ inputTemplate: pms/UploadPartnerCert/uploadCert2
+ outputTemplate: pms/error
+ input: '{
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: ' {
+ "errors": [
+ {
+ "errorCode": "PMS_COR_001"
+ }
+ ]
+}'
+ Pms_UploadPartnerCert_invalid_certificate:
+ endPoint: /v1/partnermanager/partners/certificate/upload
+ description: Upload Partner Cert by giving invalid cert data
+ role: partnerrevamp
+ restMethod: post
+ inputTemplate: pms/UploadPartnerCert/uploadCert3
+ outputTemplate: pms/error
+ input: '{
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: ' {
+ "errors": [
+ {
+ "errorCode": "KER-KMS-013"
+ }
+ ]
+}'
+ Pms_UploadPartnerCert_invalid_Domain:
+ endPoint: /v1/partnermanager/partners/certificate/upload
+ description: Upload Partner Cert by giving invalid domain
+ role: partnerrevamp
+ restMethod: post
+ inputTemplate: pms/UploadPartnerCert/uploadCert4
+ outputTemplate: pms/error
+ input: '{
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: ' {
+ "errors": [
+ {
+ "errorCode": "KER-PCM-011"
+ }
+ ]
+}'
+ Pms_UploadPartnerCert_UploadAgain_All_Valid_Smoke:
+ endPoint: /v1/partnermanager/partners/certificate/upload
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/UploadPartnerCert/uploadCert
+ outputTemplate: pms/UploadPartnerCert/uploadCertResult
+ input: '{
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: ' {
+}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/VerifyPartnersEmail/VerifyPartnersEmail.yml b/apitest/src/main/resources/pms/VerifyPartnersEmail/VerifyPartnersEmail.yml
index 9b6753794e..c0bcd8a717 100644
--- a/apitest/src/main/resources/pms/VerifyPartnersEmail/VerifyPartnersEmail.yml
+++ b/apitest/src/main/resources/pms/VerifyPartnersEmail/VerifyPartnersEmail.yml
@@ -42,4 +42,55 @@ VerifyPartnersEmail:
}'
output: '{
"emailExists": true
+}'
+ Pms_VerifyPartnersEmail_without_auth:
+ endPoint: /v1/partnermanager/partners/email/verify
+ role: batch
+ restMethod: put
+ inputTemplate: pms/VerifyPartnersEmail/verifyPartnersEmail
+ outputTemplate: pms/error
+ input: '{
+ "emailId": "mosip98763@gmail.com",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "KER-ATH-401"
+ }
+ ]
+}'
+ Pms_VerifyPartnersEmail_missing_email:
+ endPoint: /v1/partnermanager/partners/email/verify
+ role: partnerrevamp
+ restMethod: put
+ inputTemplate: pms/VerifyPartnersEmail/verifyPartnersEmail
+ outputTemplate: pms/error
+ input: '{
+ "emailId": "$REMOVE$",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": null
+ }
+ ]
+}'
+ Pms_VerifyPartnersEmail_invalid_email:
+ endPoint: /v1/partnermanager/partners/email/verify
+ role: partnerrevamp
+ restMethod: put
+ inputTemplate: pms/VerifyPartnersEmail/verifyPartnersEmail
+ outputTemplate: pms/error
+ input: '{
+ "emailId": "gfhgytth",
+ "requesttime": "$TIMESTAMP$"
+}'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_PRT_012"
+ }
+ ]
}'
\ No newline at end of file
diff --git a/apitest/src/main/resources/pms/partnerPolicyMapping/partnerPolicyMapping.yml b/apitest/src/main/resources/pms/partnerPolicyMapping/partnerPolicyMapping.yml
index 5f8621db18..7c01e617a2 100644
--- a/apitest/src/main/resources/pms/partnerPolicyMapping/partnerPolicyMapping.yml
+++ b/apitest/src/main/resources/pms/partnerPolicyMapping/partnerPolicyMapping.yml
@@ -13,4 +13,84 @@ partnerPolicyMapping:
"requesttime": "$TIMESTAMP$"
}'
output: '{
- }'
\ No newline at end of file
+ }'
+
+ Pms_partnerPolicyMapping_invalid_policyName:
+ endPoint: /v1/partnermanager/partners/111999/policy/map
+ description: Mapping Partner & Policy when invalid policyname is given
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/partnerPolicyMapping/partnerPolicyMapping
+ outputTemplate: pms/error
+ input: '{
+ "policyName": "%^776hfgsdf",
+ "useCaseDescription": "Need to submit the payment",
+ "requesttime": "$TIMESTAMP$"
+ }'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_PRT_073"
+ }
+ ]
+ }'
+ Pms_partnerPolicyMapping_invalid_partnerId:
+ endPoint: /v1/partnermanager/partners/1hhggg9/policy/map
+ description: Mapping Partner & Policy when invalid partnerId is given
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/partnerPolicyMapping/partnerPolicyMapping
+ outputTemplate: pms/error
+ input: '{
+ "policyName": "mosip policy 19234",
+ "useCaseDescription": "Need to submit the payment",
+ "requesttime": "$TIMESTAMP$"
+ }'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_PRT_005"
+ }
+ ]
+ }'
+ Pms_partnerPolicyMapping_missing_policyName:
+ endPoint: /v1/partnermanager/partners/111999/policy/map
+ description: Mapping Partner & Policy when policyname is removed from request
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/partnerPolicyMapping/partnerPolicyMapping
+ outputTemplate: pms/error
+ input: '{
+ "policyName": "$REMOVE$",
+ "useCaseDescription": "Need to submit the payment",
+ "requesttime": "$TIMESTAMP$"
+ }'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_COR_001"
+ }
+ ]
+ }'
+ Pms_partnerPolicyMapping_missing_useCaseDescription:
+ endPoint: /v1/partnermanager/partners/111999/policy/map
+ description: Mapping Partner & Policy when usecaseDescription is removed from request
+ role: partnerrevamp
+ checkErrorsOnlyInResponse: true
+ restMethod: post
+ inputTemplate: pms/partnerPolicyMapping/partnerPolicyMapping
+ outputTemplate: pms/error
+ input: '{
+ "policyName": "mosip policy 19234",
+ "useCaseDescription":"$REMOVE$",
+ "requesttime": "$TIMESTAMP$"
+ }'
+ output: '{
+ "errors": [
+ {
+ "errorCode": "PMS_COR_001"
+ ]
+ }'
\ No newline at end of file
diff --git a/apitest/testNgXmlFiles/pmsApi.xml b/apitest/testNgXmlFiles/pmsApi.xml
index c061a5bd8b..b695f61852 100644
--- a/apitest/testNgXmlFiles/pmsApi.xml
+++ b/apitest/testNgXmlFiles/pmsApi.xml
@@ -46,6 +46,29 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
@@ -63,6 +95,30 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
@@ -131,6 +217,37 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
@@ -167,7 +298,31 @@
-
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
@@ -195,7 +350,13 @@
-
+
+
+
+
+
+
@@ -205,4 +366,14 @@
name="io.mosip.testrig.apirig.testscripts.PutWithPathParamsAndBody" />
+
+
+
+
+
+
+
+
+